During the course of business, we receive, process, transmit and store confidential customer, employee, vendor and Company information through our information technology systems and those of our third-party payment processors. The protection of this information is critical, and the regulatory environment surrounding information security and privacy is demanding, with the frequent imposition of new and changing requirements. Although we have implemented systems and procedures (including credit card encryption between terminals and payment processors, Advance Malware Protection built into firewalls, POS stations on separate VLANS, and encrypted cloud-hosted storage) that are designed to protect customer, employee, vendor and Company information, prevent data loss and other security breaches, and otherwise identify, assess, and analyze cybersecurity risks, these measures may not be effective. Cyber-security risks such as malicious software and attempts to gain unauthorized access to data are rapidly evolving and becoming increasingly more sophisticated. Techniques or software used to gain unauthorized access, and/or disable, degrade or harm our systems may be difficult to detect for prolonged periods of time, and we may be unable to anticipate these techniques or put in place protective or preventive measures. These attempts to gain unauthorized access could lead to disruptions in our systems, unauthorized release of confidential or otherwise protected information or corruption of data. If individuals are successful in infiltrating, breaking into, disrupting, damaging or otherwise stealing from the computer systems of the Company or its third-party providers, we may have to make a significant investment to fix or replace them, and may suffer interruptions in our operations in the interim, including interruptions in our ability to accept payment from customers. While, to the best of our knowledge, we have not experienced any material misappropriation, loss or other unauthorized disclosure of confidential or personally identifiable information as a result of a security breach or cyber-attack that could materially increase financial risk to the Company or our customers, such a security breach or cyber-attack could adversely affect our business and operations, including by damaging our reputation and our relationships with our customers, employees, suppliers and investors, exposing us to litigation, fines and penalties.